Volume 2, Issue 5

Volume 2, Issue 5

May, 2019

Research Paper

1. Forward error correction using block coding method in Industrial Wireless Communication

With the advent of technology, networking has become increasingly popular in various fields like satellite communication, digital cellular communication, wireless LAN communication, fibre communication and many more. Today, a lot of data is generated by one or more source computers which have to be processed efficiently and delivered to respective destinations. So, engineers are looking at developing better programs to achieve efficiency and improve the quality of transmission. In this paper, we are presenting a Forward Error Correction in industrial Wireless Communication model. Forward error correction (FEC) is a digital signal processing technique used to enhance data reliability. It does this by introducing redundant data, called error correcting code, prior to data transmission or storage. FEC provides the receiver with the ability to correct errors without a reverse channel to request the retransmission of data.

Published by: Sheela B. P., Saima Farheen, Indraja B. K., Shruthi B. A., Dr. Sreepathi BResearch Area: Computer Networks

Organisation: Rao Bahadur Y Mahabaleswarappa Engineering College, Bellary, KarnatakaKeywords: (FEC) Forward Error Correction, Error-Correcting Code (ECC), Industrial Wireless Sensor Networks (IWSNs)

Research Paper

2. RFID technology: Its overview and applications

Radio-frequency identification (RFID) is a technology that performs communication via electromagnetic waves to exchange data between a terminal and an electronic tag attached to an object. This paper gives a brief introduction about the RFID technology, its uses, and its application. RFID is used in various fields, which shows that it has endless applications.

Published by: Awyaya Chaturvedi, Somiya Sharma, Shivangi Sachan, Jogendra KumarResearch Area: RFID Technology

Organisation: Dr. Akhilesh Das Gupta Institute of Technology and Management, New Delhi, DelhiKeywords: RFID card reader, Smart card, RFID applications

Survey Report

3. Survey on ethical hacking

Everyone understands that the internet is developing at a quicker speed. All the information can be given to everyone in a single tick. With the generation of positive impacts, there are also some negative impacts which change the life of govt. or private companies. Security is one amongst the problems for organizations, govt. All are distressed over their personal data. Hacking is a specialized technique to regulate the everyday code of conduct of systems’ association and connected frameworks or networks capability. Ethical hacking is the indistinguishable action that goals to discovery and corrects the weakness and vulnerabilities inside a system. Ethical hacking describes the procedure of hacking a system in the ethical means, thus with smart functions. This paper describes what's ethical hacking, what are the categories of ethical hacking, the impact of Hacking on Businesses and Governments. This paper studied the various varieties of hacking with its stages.

Published by: Madhusudhan SharmaResearch Area: Computer Science

Organisation: Babu Banarasi Das Institute of Technology, Ghaziabad, Uttar PradeshKeywords: White hat hacker, Ethical hacking, Hackers, Black hat hackers, Hacking stages, Hacking tools